Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 09:15
Behavioral task
behavioral1
Sample
624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp
Resource
win7-20231129-en
General
-
Target
624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp
-
Size
3.5MB
-
MD5
17c74f1615658e6fc92babdcc87957d8
-
SHA1
aef767b22dbd881a0462c59a2d15287e5d24462f
-
SHA256
9be1a95a3682b07aa53a5d6f63be3e131d2ba8da68204f71c3ed87ac3fc28528
-
SHA512
d5e184f174f5764196630cfdfc70a128497562247cc2f20750ae6173629aca98b402844972f315db50f2c6df53058fde52fb62a829ba88ced47c54da0750b68c
-
SSDEEP
6144:gmFFYrx0PmfUH1YTCh+mlrDvWBaoakAI04Yd1FkMGDhGQBe:lFFYrkmfUVY8+mp3I0/ZkMi+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.dmp rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.dmp\ = "dmp_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\dmp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2740 wrote to memory of 2680 2740 cmd.exe rundll32.exe PID 2740 wrote to memory of 2680 2740 cmd.exe rundll32.exe PID 2740 wrote to memory of 2680 2740 cmd.exe rundll32.exe PID 2680 wrote to memory of 2716 2680 rundll32.exe AcroRd32.exe PID 2680 wrote to memory of 2716 2680 rundll32.exe AcroRd32.exe PID 2680 wrote to memory of 2716 2680 rundll32.exe AcroRd32.exe PID 2680 wrote to memory of 2716 2680 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\624-36-0x00000000048C0000-0x0000000004C47000-memory.dmp"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fd342a2c7ae16f3435808606449fbcfe
SHA1e409d5041fd5c278d8dff2c3c08dfce36b7cdca9
SHA2561ba695b01c9d6038057d2ea722382f84ab34675157e772301455b0f6f3526394
SHA51264bcb006a486818f045914e237d5a469b1b66c85bb40e150681214112a39977004fe008c1d9e2fc2cd4409f7f7e2fa83d1df6d53245a542ce08094cac101a4b9